IDENTIFYING POTENTIAL MALICIOUS ATTACKS, THREATS AND VULNERABILITIES
IDENTIFYING POTENTIAL MALICIOUS ATTACKS, THREATS AND VULNERABILITIES 1. Potential malicious attacks and threats that could be carried out against networks and organizations and their potential consequences
The three potential threats that may affect the network configuration are:
This type of attack is a group of compromised systems (also known as "zombie computers") that attack a single target to cause a denial of service to users themselves are legitimate. The attack consists of a huge flow of messages and requests to the target network. The information flow is released for this overloading and force the system to shut down; as a result, it denies service to legitimate users. A typical way ...